Saturday, April 20, 2013

Top 10 Music 2013 ♪ ♫ ♪


*NOTE 
PLEASE PAUSE MY MP3 TO LISTEN THIS MUSIC "Maroon 5 - One More Night"


1.I Knew You Were Trouble

Taylor Swift


2.Locked Out of Heaven

Bruno Mars


3.Ho Hey

The Lumineers


4.Don't You Worry Child 

 Swedish House Mafia


5.Sure Be Cool If You Did

Blake Shelton


6.Don't Stop the Party

Pitbull



7.The Moment I Knew

Taylor Swift



8.Home

Phillip Phillips



9.Beauty and a Beat 

Justin Bieber



10.If I Lose Myself

OneRepublic

Sunday, April 14, 2013

Hacking Tools 2013 – Cracking Tools 2013




Berikut ini adalah Download Hacking Tools 2013, Hacking Tools 2013, Tools Hacking 2013, Cracking Tools 2013, Tools Cracking 2013, Tool Hack 2013, Tool Crack 2013, Tool Hacking 2013, Tool Cracking 2013, Tool Hacker 2013, Tool Cracker 2013, Tools Hacker 2013, Tools Cracker 2013, Pentest Tool 2013, Security Tools 2013, Password Hack 2013, yang mungkin bisa bermanfaat untuk bisa anda pakai di 2013. Happy Hacking All :)
hacking tools 2013 cracking tools 2013 security tools 2013 pentesting tools 2013
Ayo buruan download penetration testing 2013 and security tools 2013, networking tools 2013, gmail hacking tools 2013, learn ethical hacking 2013, vulnerability assessment 2013, penetration testing 2013, email hacking 2013, password hacking 2013, reverse engineering 2013. Download hacking tools, networking tools, gmail hacking, learn ethical hacking, vulnerability, penetration testing, hack email, hacking, password hacking, reverse engineering 2013, wifi hacker 2013. Hacker Tools 2013, Hack Tool 2013, Hacker Tool 2013, Hacking Tool 2013, Hack Tool 2013, Cracking Tools 2013, Cracker Tools 2013, Cracking Tool 2013, Cracker Tool 2013, Crack Tools 2013, Crack Tool 2013, Security Tool 2013, Pentester Tool 2013, Password Cracker 2013, Password Hacking2013.

1. PWN STAR

Sebuah script bash untuk meluncurkan AP , dapat dikonfigurasi dengan berbagai macam pilihan serangan. Termasuk sejumlah script index.html dan server php, untuk phishing. Dapat bertindak sebagai multi-klien captive portal menggunakan php dan iptables. Eksploitasi klasik seperti kejahatan-PDF, De-auth dengan aireplay, dll.
PwnStar BinusHacker
Fitur Umum:
  1. Mengelola Antarmuka dan MAC Spoofing
  2. Mengatur sniffing
  3. Web phishing
  4. Karmetasploit
  5. WPA handshake
  6. De-auth klien
  7. Mengelola Iptables
Download PwnStar Disini:

2. ZED Attack Proxy (ZAP)

(ZAP) adalah alat penetrasi pengujian terpadu untuk menemukan kerentanan dalam aplikasi web. Tools ini dirancang untuk digunakan oleh orang-orang dengan berbagai pengalaman security dan dengan demikian sangat ideal untuk para pengembang dan penguji fungsional yang baru untuk penetration testing serta menjadi tambahan yang berguna untuk toolbox tester.
ZAP - Zen Attack Proxy 2013
Fitur Utama:
  1. Intercepting Proxy
  2. Active scanner
  3. Passive scanner
  4. Brute Force scanner
  5. Spider
  6. Fuzzer
  7. Port Scanner
  8. Dynamic SSL certificates
  9. API
  10. Beanshell integration
Download ZAP Disini:

3. SET (Social Engineering Toolkit)

Tools yang berfokus pada menyerang unsur kelemahan dan kelengahan manusia. Tool ini sangat banyak digunakan saat ini dan merupakan salah satu tools yang sukses di demonstrasikan di Defcon.
SET - Social Engineering Toolkit BinusHacker
Fitur Utama:
  • Spear-Phishing Attack Vector
  • Java Applet Attack Vector
  • Metasploit Browser Exploit Method
  • Credential Harvester Attack Method
  • Tabnabbing Attack Method
  • Man Left in the Middle Attack Method
  • Web Jacking Attack Method
  • Multi-Attack Web Vector
  • Infectious Media Generator
  • Teensy USB HID Attack Vector

Download Social Engineering Toolkit Disini:

4. BURP SUITE

Burp Suite adalah alat yang sangat bagus sekali untuk pengujian keamanan aplikasi web. Alat ini sangat bagus untuk pentester dan peneliti keamanan. Ini berisi berbagai alat dengan antarmuka banyak di antara mereka yang dirancang untuk memudahkan dan mempercepat proses menyerang aplikasi website.
Burp Suite - BinusHacker
Fungsi Umum:
  1. Intersepsi proxy
  2. Radar crawling dan spider
  3. Webapps scanner
  4. Alat penyerangan
  5. Repeater dan sequencer tools
Download Burp Suite Disini:

5. ETTERCAP

Ettercap adalah sniffer multiguna / interceptor / logger untuk Local Area Network. Mendukung diseksi aktif dan pasif dari banyak protokol (bahkan yang dalam bentuk kode) dan mencakup banyak fitur untuk analisis jaringan dan host.
Ettercap - BinusHacker
Ettercap - BinusHacker
Fungsi Umum:
  1. Untuk melakukan capture traffic dan data
  2. Untuk melakukan logging network
  3. Dll
Download Ettercap Disini:

6. SANS Investigative Forensic Toolkit (SIFT)

The SANS Investigative Forensic Toolkit (SIFT) Workstation adalah VMware Appliance yang bisa di konfigurasi dengan semua kebutuhan untuk melakukan digital forensik secara mendetail. Kompatible dengan Expert Witness Format (E01), Advanced Forensic Format (AFF), and raw (dd) evidence formats. Versi baru telah sepenuhnya dibangun kembali pada basis Ubuntu dengan banyak tools tambahan dan kemampuan yang digunakan dalam teknologi modern forensik.SANS+Investigative+Forensic+Toolkit+2.14+Released
Fungsi Umum SIFT:
  1. iPhone, Blackberry, and Android Forensic Capabilities
  2. Registry Viewer (YARU)
  3. Compatibility with F-Response Tactical, Standard, and Enterprise
  4. PTK 2.0 (Special Release – Not Available for Download)
  5. Automated Timeline Generation via log2timeline
  6. Many Firefox Investigative Plugins
  7. Windows Journal Parser and Shellbags Parser (jp and sbag)
  8. Many Windows Analysis Utilities (prefetch, usbstor, event log, and more)
  9. Complete Overhaul of Regripper Plugins (added over 80 additional plugins)
Download SANS Investigative Forensic Toolkit (SIFT) Disini:

7. WIRESHARK

Wireshark adalah alat yang paling banyak digunakan dan paling populer pada dunia analyzer protokol, dan merupakan standar de facto di banyak industri dan lembaga pendidikan untuk menganalisa jaringan di berbagai protokol.
Wire Shark - 2013 - BinusHacker
Fungsi Umum:
  1. Live capture and offline analysis
  2. Standard three-pane packet browser
  3. Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
  4. Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
  5. The most powerful display filters in the industry
  6. Rich VoIP analysis
  7. Read/write many different capture file formats
  8. Dll
Download WireShark Disini:

8. WEBSPLOIT

WebSploit adalah Open Source Project untuk Scan dan Analysis Remote System dari kelemahan-kelemahan pada aplikasi website.
WebSploit+Framework+2.0.3+with+Wifi+Jammer
Fitur Utama:
[>]Social Engineering Works
[>]Scan,Crawler & Analysis Web
[>]Automatic Exploiter
[>]Support Network Attacks
—-
[+]Autopwn – Used From Metasploit For Scan and Exploit Target Service
[+]wmap – Scan,Crawler Target Used From Metasploit wmap plugin
[+]format infector – inject reverse & bind payload into file format
[+]phpmyadmin Scanner
[+]LFI Bypasser
[+]Apache Users Scanner
[+]Dir Bruter
[+]admin finder
[+]MLITM Attack – Man Left In The Middle, XSS Phishing Attacks
[+]MITM – Man In The Middle Attack
[+]Java Applet Attack
[+]MFOD Attack Vector
[+]USB Infection Attack
[+]ARP Dos Attack
[+]Web Killer Attack
[+]Fake Update Attack
[+]Fake Access point Attack
Download WebSploit Framework Disini:

9. WINAUTOPWN

WinAutoPWN merupakan sebuah tools yang digunakan untuk mengexploitasi secara langsung Windows Framework, sehingga secara otomatis kita yang akan menjadi administrator di windows tersebut. Banyak digunakan oleh “Defacer” Indonesia untuk melakukan deface terhadap Windows Server :)
WinAutoPWN 2013 - BinusHacker
Download WinAutoPWN Disini:

10. HASHCAT

Hashcat adalah sebuah tools untuk crack berbagai password yang di encrypt, sangat powerfull untuk recovery password.
Hashcat 2013 - BinusHacker
Fungsi Umum:
  1. Multi-Threaded
  2. Free
  3. Multi-Hash (up to 24 million hashes)
  4. Multi-OS (Linux, Windows and OSX native binaries)
  5. Multi-Algo (MD4, MD5, SHA1, DCC, NTLM, MySQL, …)
  6. SSE2 accelerated
  7. All Attack-Modes except Brute-Force and Permutation can be extended by rules
  8. Very fast Rule-engine
  9. Rules compatible with JTR and PasswordsPro
  10. Possible to resume or limit session
  11. Automatically recognizes recovered hashes from outfile at startup
  12. Can automatically generate random rules
  13. Load saltlist from external file and then use them in a Brute-Force Attack variant
  14. Able to work in an distributed environment
  15. Specify multiple wordlists or multiple directories of wordlists
  16. Number of threads can be configured
  17. Threads run on lowest priority
  18. 30+ Algorithms implemented with performance in mind
  19. … and much more
Download HashCat Disini:

11. UNISCAN

Uniscan adalah scanner untuk aplikasi web, yang ditulis dalam perl untuk Linux. Saat ini versi Uniscan adalah 6,2.
uniscan
Fungsi Umum:
  1. Identification of system pages through a Web Crawler.
  2. Use of threads in the crawler.
  3. Control the maximum number of requests the crawler.
  4. Control of variation of system pages identified by Web Crawler.
  5. Control of file extensions that are ignored.
  6. Test of pages found via the GET method.
  7. Test the forms found via the POST method.
  8. Support for SSL requests (HTTPS).
  9. Proxy support.
  10. Generate site list using Google.
  11. Generate site list using Bing.
  12. Plug-in support for Crawler.
  13. Plug-in support for dynamic tests.
  14. Plug-in support for static tests.
  15. Plug-in support for stress tests.
  16. Multi-language support.
  17. Web client.
Download Uniscan Disini:

12. OLYYDBG

OllyDbg adalah 32-bit assembler debugger untuk Microsoft Windows. Penekanan pada analisis kode biner membuatnya sangat berguna dalam kasus-kasus di mana sourcecode tidak tersedia.
OllyDbg Cracking 2013 - BinusHacker
Fungsi Umum:
  1. Intuitive user interface, no cryptical commands
  2. Code analysis – traces registers, recognizes procedures, loops, API calls, switches, tables, constants and strings
  3. Directly loads and debugs DLLs
  4. Object file scanning – locates routines from object files and libraries
  5. Allows for user-defined labels, comments and function descriptions
  6. Understands debugging information in Borland® format
  7. Saves patches between sessions, writes them back to executable file and updates fixups
  8. Open architecture – many third-party plugins are available
  9. No installation – no trash in registry or system directories
  10. Debugs multithread applications
  11. Attaches to running programs
  12. Configurable disassembler, supports both MASM and IDEAL formats
  13. MMX, 3DNow! and SSE data types and instructions, including Athlon extensions
  14. Full UNICODE support
  15. Dynamically recognizes ASCII and UNICODE strings – also in Delphi format!
  16. Recognizes complex code constructs, like call to jump to procedure
  17. Decodes calls to more than 1900 standard API and 400 C functions
  18. Gives context-sensitive help on API functions from external help file
  19. Sets conditional, logging, memory and hardware breakpoints
  20. Traces program execution, logs arguments of known functions
  21. Shows fixups
  22. Dynamically traces stack frames
  23. Searches for imprecise commands and masked binary sequences
  24. Searches whole allocated memory
  25. Finds references to constant or address range
  26. Examines and modifies memory, sets breakpoints and pauses program on-the-fly
  27. Assembles commands into the shortest binary form
  28. Starts from the floppy disk
Download Ollydbg Disini:

13. BBQSQL

BBQSQL merupakan Opensource SQL injection tools dengan kerangka kerja khusus yang dirancang untuk menjalankan proses secara hyper cepat, agnostik database, mudah untuk setup, dan mudah untuk memodifikasi. Ini adalah satu lagi rilis mengagumkan dari Arsenal 2012 Blackhat USA. Ketika melakukan penilaian keamanan aplikasi, kita sering menemukan kerentanan SQL yang sulit untuk di exploitasi, dengan tools ini akan menjadi sangat mudah.
BBQSQL ditulis dengan bahasa pemrograman Python. Hal ini sangat berguna ketika menyerang kerentanan SQL injection rumit. BBQSQL juga merupakan alat semi-otomatis, yang memungkinkan sedikit kustomisasi bagi mereka yang sulit untuk memicu temuan injeksi SQL. Alat ini dibangun untuk menjadi agnostik database dan sangat serbaguna. Ia juga memiliki UI intuitif untuk membuat pengaturan serangan jauh lebih mudah.
BBQSQL SQL Injection Tools 2013 - BinusHacker
Fungsi Umum:
  1. SQL Injection Tools
  2. URL
  3. HTTP Method
  4. Headers
  5. Cookies
  6. Encoding methods
  7. Redirect behavior
  8. Files
  9. HTTP Auth
  10. Proxies
Download BBQSQL Disini:

14. CRYPTOHAZE

Tools untuk crack password / hash dimana cryptohaze mendukung CUDA, OpenCL, dan CPU kode (SSE, AVX, dll). Bisa berjalan di OS yang support CUDA. Semua ini ditujukan untuk pentester agar lebih mudah dalam melakukan crack hash.
CryptoHaze 2013 - BinusHacker
Fungsi Umum:
  1. Crack berbagai macam hash
  2. Menampilkan hasil dari crackhash
  3. Cracking di berbagai platform OS
Download Cryptohaze Disini:

15. SAMURAI WEB TESTING FRAMEWORK (SWTF)

SWTF ini digunakan untuk melakukan pengujian / pentest terhadap web application, digunakan untuk menemukan kelemahan dan melakukan exploitasi terhadap web tersebut. Sangat komplit dan banyak digunakan didunia termasuk digunakan oleh salah satu staff binushacker :)
Samurai Web Pentest 2013 - BinusHacker
Fungsi Umum:
  1. Web Scanner
  2. Web Mapping
  3. Web Exploitation
Download The Samurai Web Testing Framework Disini:


Tools di atas wajib untuk dimiliki di 2013, selamat untuk mencoba dan bereksperimen di awal tahun baru ini

 ..thanks to binus hackers

Anonymous - #Operation Israel (v2.0)




Greetings World.

During November 2012 Israel's aggression towards the people living in the Gaza strip resulted in the deaths of more than one hundred people. This included thirty children and wounding more than 1000 others. At the time of the aggression, #OpIsrael was launched. Within few hours of the operation launch there were thousands of defaces and hacks, databases released or deleted, dozens of disruptions to government sites and more. Peace had been achieved for the residents of Gaza and Israel. However, this peace was short lived.

As many mainstream media outlets have made known, Israel has broken the November 21st ceasefire truce by launching air strikes in northern Gaza. What these mainstream media outlets do not allow you to know is that Israel has violated the ceasefire agreement more than one hundred times, killing four palestinians in Gaza, and injuring dozens of others between November 21st and today.

Furthermore, Palestinians from Gaza to the West Bank continue to be attacked, raided, segregated, imprisoned and grossly mistreated in prison while illegal Israeli settlements and Israeli land theft continues unchecked, even after a UN panel declared these settlements illegal in January. Gaza suffers a seemingly endless and inhumane blockade where the only import is Israeli sewage pumped directly into it and US made teargas, bombs, and bullets that are used by the IDF to attack a largely defenseless population.

To the government of Israel: You have NOT stopped your endless human right violations. You have NOT stopped illegal settlements. You have NOT respected the ceasefire. You have shown that you do NOT respect international law. This is why that on April 7, elite cyber-squadrons from around the world have decided to unite in solidarity with the Palestinian people against Israel as one entity to disrupt and erase Israel from cyberspace.


We are Anonymous.We are Legion.We do not forgive.We do not forget.To the Government of Israel, it is too late to EXPECT US.

Anonymous (gruop)



Anonymous

An image commonly associated with Anonymous. The "suit without a head" represents leaderless organization and anonymity.[1]

Individuals appearing in public as Anonymous, wearing Guy Fawkes masks.
Formation2003–present
TypeMultiple-use name/avatar;
Virtual community;
Voluntary association
Purpose/focusanti-cyber-surveillance;
anti-cyber-censorship;
Internet activism;
Internet trolling;
Internet vigilantism
Region servedGlobal
MembershipDecentralized affinity group
Anonymous (used as a mass noun) is a loosely associated hacktivist group. It originated in 2003 on the imageboard 4chan, representing the concept of many online and offline community users simultaneously existing as an anarchic, digitized global brain.[2] It is also generally considered to be a blanket term for members of certain Internet subcultures, a way to refer to the actions of people in an environment where their actual identities are not known.[3][verification needed] It strongly opposes Internet censorship and surveillance, and has hacked various government websites. It has also targeted major security corporations.[4][5][6] It also opposes Scientology, government corruption and homophobia. Its members can be distinguished in public by the wearing of stylised Guy Fawkes masks.[7]
In its early form, the concept was adopted by a decentralized online community acting anonymously in a coordinated manner, usually toward a loosely self-agreed goal, and primarily focused on entertainment. Beginning with 2008, the Anonymous collective became increasingly associated with collaborative, international hacktivism. They undertook protests and other actions in retaliation against anti-digital piracy campaigns by motion picture and recording industry trade associations.[8][9] Actions credited to "Anonymous" were undertaken by unidentified individuals who applied the Anonymous label to themselves as attribution.[10] They have been called the freedom fighters of the Internet,[11] a digital Robin Hood,[12] and "anarchic cyber-guerrillas."[13]
Although not necessarily tied to a single online entity, many websites are strongly associated with Anonymous. This includes notable imageboards such as 4chan, their associated wikisEncyclopædia Dramatica, and a number of forums.[14] After a series of controversial, widely publicized protests, distributed denial of service (DDoS) and website defacement attacks by Anonymous in 2008, incidents linked to its members increased.[15]In consideration of its capabilities, Anonymous was posited by CNN in 2011 to be one of the three major successors to WikiLeaks.[16] In 2012, Time named Anonymous as one of the most influential groups in the world.[17]

Contents

  [hide

Background

Origins

A member holding an Anonymous flier atOccupy Wall Street, a protest that the group actively supported, September 17, 2011
The name Anonymous itself is inspired by the perceived anonymity under which users post images and comments on the Internet. Usage of the term Anonymous in the sense of a shared identity began on imageboards.[14] A tag of Anonymous is assigned to visitors who leave comments without identifying the originator of the posted content. Users of imageboards sometimes jokingly acted as if Anonymous were a real person. The concept of the Anonymous entity advanced in 2004 when an administrator on the 4chan image board activated a "Forced_Anon" protocol that signed all posts as Anonymous.[14] As the popularity of imageboards increased, the idea of Anonymous as a collective of unnamed individuals became an Internet meme.[18]
Anonymous broadly represents the concept of any and all people as an unnamed collective. As a multiple-use name, individuals who share in the "Anonymous" moniker also adopt a shared online identity, characterized as hedonistic and uninhibited. This is intended as a satirical, conscious adoption of the online disinhibition effect.[19]
We [Anonymous] just happen to be a group of people on the internet who need—just kind of an outlet to do as we wish, that we wouldn't be able to do in regular society. ...That's more or less the point of it. Do as you wish. ... There's a common phrase: 'we are doing it for the lulz.'
—Trent Peacock. Search Engine: The face of Anonymous, February 7, 2008.[19]
Definitions tend to emphasize that the concept, and by extension the collective of users, cannot be readily encompassed by a simple definition. Instead Anonymous is often defined by aphorisms describing perceived qualities.[2] One self-description, originating from a protest video targeted at the Church of Scientology, is:
We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.[20]

Overview

[Anonymous is] the first Internet-basedsuperconsciousness. Anonymous is a group, in the sense that a flock of birds is a group. How do you know they're a group? Because they're traveling in the same direction. At any given moment, more birds could join, leave, peel off in another direction entirely.
—Chris Landers. Baltimore City Paper, April 2, 2008.[2]
Anonymous consists largely of users from multiple imageboards and Internet forums. In addition, several wikis and Internet Relay Chat networks are maintained to overcome the limitations of traditional imageboards. These modes of communication are the means by which Anonymous protesters participating in Project Chanologycommunicate and organize upcoming protests.[21][22]
A "loose coalition of Internet denizens,"[23] the group bands together through the Internet, using IRC channels[21] and sites such as 4chan,[21][23] 711chan,[21]Encyclopædia Dramatica,[24] and YouTube.[3] Social networking services, such as Facebook, are used for to mobilize groups for real-world protests.[25]
Anonymous has no leader or controlling party and relies on the collective power of its individual participants acting in such a way that the net effect benefits the group.[23]"Anyone who wants to can be Anonymous and work toward a set of goals..." a member of Anonymous explained to the Baltimore City Paper. "We have this agenda that we all agree on and we all coordinate and act, but all act independently toward it, without any want for recognition. We just want to get something that we feel is important done..."[2] A statement attributed to Anonymous has described Anonymous as containing every belief and lifestyle, and that the views of "the loudest" of Anonymous aren't necessarily the views of the rest of Anonymous.[26][27][28][29] Anonymous members have previously collaborated with hacker groupLulzSec.[citation needed]

Membership

It is impossible to 'join' Anonymous, as there is no leadership, no ranking, and no single means of communication. Anonymous is spread over many mediums and languages, with membership being achieved simply by wishing to join.[30]
Anonymous protestors at the Brussels Stock Exchange, Belgium, January 2012

Commander X and the People's Liberation Front

A person known as Commander X provided interviews and videos about Anonymous.[31] In 2011, he was at the center of an investigation into Anonymous by HBGary CEO Aaron Barr, who claimed to have identified him as a San Francisco gardener. Interviewed following theattack on HBGary Federal, Commander X revealed that while Barr suspected that he was a leader of the group, he was in his own words a "peon." However, Commander X did claim to be a skilled hacker and founding member of an allied organization, the Peoples Liberation Front (PLF).[32] According to Commander X, Peoples Liberation Front, a collective of hactivists founded in 1985, acted with AnonOps, another sub-group of Anonymous, to carry out denial-of-service (DDoS) attacks against government websites in Tunisia, Iran, Egypt, and Bahrain. Explaining the relationship between Anonymous and the PLF, he suggested an analogy to NATO, with the PLF being a smaller sub-group that could choose to opt in or out of a specific project. "AnonOps and the PLF are both capable of creating huge "Internet armies." The main difference is AnonOps moves with huge force, but very slowly because of their decision making process. The PLF moves with great speed, like a scalpel."[33] On September 23, 2011, a homeless man in California named Christopher Doyon was arrested and stated by officials to have used the Commander X screen name.[34] He pleaded not guilty.[35]

Low Orbit Ion Cannon

The Low Orbit Ion Cannon is a network stress testing application that has been used by Anonymous to accomplish its DDoS attacks. Individual users download the LOIC and voluntarily contribute their computer to a bot net. This bot net is then directed against the target by AnonOps.[36] Joining the bot net and volunteering one's resources for the use of the group is thus one way of being a "member," a concept that is otherwise hard to define.

Activities

The Pirate Bay

In April 2009, after The Pirate Bay co-defendants were found guilty of facilitating extensive copyright infringement "in a commercial and organized form", Anonymous launched a coordinated DDoS attack against the International Federation of the Phonographic Industry(IFPI), an organisation responsible for safeguarding recording artists' rights.[37] When co-founders lost their appeal against convictions for encouraging piracy, Anonymous again targeted the IFPI, labelling them "parasites." A statement read: "We will continue to attack those who embrace censorship. You will not be able to hide your ludicrous ways to control us."[38][39]
Anonymous supporters at anOccupy OKC rally near theOklahoma State Capitol Building.

Megaupload

On January 19, 2012, Megaupload, a website providing file-sharing services, was shut down by theUS Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI).[40] In the hours following the shutdown, hackers took down the sites of the DOJ and FBI, as well as the Motion Picture Association of America (MPAA), the Recording Industry Association of America (RIAA), andBroadcast Music, Inc. (BMI) using distributed denial-of-service (DDoS) attacks.[41] Barrett Brown, described as a spokesperson for Anonymous, called the attack "the single largest Internet attack in [Anonymous'] history."[42] With the protests against the Stop Online Piracy Act (SOPA) protests only a day old, Brown stated that internet users were "by-and-far ready to defend an open Internet."[42]
Although the actions of Anonymous received support,[citation needed] some commentators argued that the denial of service attack risked damaging the anti-SOPA case. Molly Wood of CNET wrote that "[i]f the SOPA/PIPA protests were the Web's moment of inspiring, non-violent, hand-holding civil disobedience, #OpMegaUpload feels like the unsettling wave of car-burning hooligans that sweep in and incite the riot portion of the play."[43] Dwight Silverman of the Houston Chronicle concurred, stating that "Anonymous' actions hurt the movement to kill SOPA/PIPA by highlighting online lawlessness."[44] The Oxford Internet Institute's Joss Wright wrote that "In one sense the actions of Anonymous are themselves, anonymously and unaccountably, censoring websites in response to positions with which they disagree."[41]

Government websites

Anonymous claimed responsibility for taking down government websites in the UK in April 2012 in protest against government extradition and surveillance policies. A message was left on Twitter saying it was "for your draconian surveillance proposals."[45]

Occupy movement

Anonymous activists merged with Occupy Wall Street protesters. Anonymous members descended on New York's Zucotti Park and organized it partly. After it became known that some Occupy protesters would get violent, Anonymous used social networking to urge Occupy protesters to avoid disorder. Anonymous used Twitter trends to keep protests peaceful.[46]
A similar protest occurred outside the London Stock Exchange in early May 2012 during a May Day Occupy protest.[47]

Internet pedophilia

Alleged Internet predator Chris Forcand, 53, was charged with child sexual and firearm offenses.[48] A newspaper report stated that Forcand was already being tracked by "cyber-vigilantes before police investigations commenced.[49] A television report identified a "self-described Internet vigilante group called Anonymous" who contacted the police after some members were "propositioned" by Forcand. The report stated this was the first time a suspected Internet predator was arrested by the police as a result of Internet vigilantism.[50]
In October 2011, "Operation Darknet" was launched as an attempt to cease the activities of child porn sites accessed through hidden services in the deep web.[51] Anonymous published in a pastebin link what it claimed were the user names of 1,589 members of Lolita City, a child porn site accessed via the Tor network. Anonymous said that it had found the site via The Hidden Wiki, and that it contained over 100 gigabytes of child pornography. Anonymous launched a denial-of-service attack to take Lolita City offline. [52]

Religious organisations

"Message to Scientology", January 21, 2008
The group gained worldwide press for Project Chanology, the protest against the Church of Scientology.[53]
The project started in response to the Church of Scientology's attempts to remove material from a highly publicized interview with Scientologist Tom Cruise from the Internet in January 2008. The project was launched in the form of a video posted to YouTube, "Message to Scientology", on January 21, 2008. The video stated that Anonymous views Scientology's actions as Internet censorship, and asserted the group's intent to "expel the church from the Internet."
In early 2011, the organisation targeted the Westboro Baptist Church, releasing several videos on a range of related topics, such as their controversial preaching against homosexuality. Several attacks were made on the primary website, one that was made while Shirley Phelps-Roper was debating Topiary (Jake Davis) a representative of Anonymous in a televised interview on the David Pakman Show.[54] Anonymous carried out another attack on December 16, 2012 in response to Westboro's picketing of funerals for the victims of the Newtown Massacre.[55] Anonymous is also supporting a petition to the White House to formally recognize the Westboro Baptist Church as ahate group.[56]

LGBT issues

On August 2012 Anonymous hacked into Ugandan government websites in protest of the pending Uganda Anti-Homosexuality Bill. A message stated :
"Anonymous will continue to target Ugandan government sites and communications until the government of Uganda treats all people including LGBT people equally."[57]
Parmy cited one research project that found that as many as thirty per cent of posters on 4chan fell into the LGBT category, posters often pretending to be the opposite sex.[14]
Anonymous declared they were going to destroy the anti-gay Westboro Baptist Church in reaction to the church claiming they would picket the funerals of the victims of the Connecticut school shootings. The group hacked into the church's website, releasing the personal information of all church members. On December 21, 2012, the group successfully launched a DDoS attack on the church's website and hacked into the Twitter account of Shirley Phelps-Roper.[58]

Cyber-attacks and other activities

The group is responsible for cyber-attacks on the Pentagon, News Corp and has also threatened to destroy Facebook.[59]
In October 2011, Anonymous hackers threatened the Mexican drug cartel known as Los Zetas in an online video after one of their members was kidnapped.[60]
In late May 2012 alleged Anonymous members claimed responsibility for taking down a GM crops website.[61]
In early September 2012 alleged Anonymous members claimed responsibility for taking down GoDaddy's Domain Name Servers, affecting small businesses around the globe.[62]
On Friday January 25, 2013, Anonymous hacked the United States Sentencing Commission website in an operation titled "Operation Last Resort". The first, unsuccessful attack, was launched early Friday morning, followed by a second successful attack around 9pm PST the same day. By 3am PST the site was down and dropped from the DNS Domain Name System, yet the IP address (66.153.19.162) still returned the defaced site's contents. Anonymous cited the recent suicide of hacktivist Aaron Swartz as a "line that has been crossed." The statement suggested retaliation for Swartz's tragic suicide, which many - including the family - believe was a result of overzealous prosecution by the Department of Justice and what the family deemed a "bullying" use of outdated computer crime laws.[63]

Israel

In response to Operation Pillar of Cloud in November 2012, Anonymous launched a series of attacks on Israeli government websites. Anonymous protested what they called the "barbaric, brutal and despicable treatment of the Palestinian people."[64]
In April 2013, there was a coordinated cyber-attack against Israeli websites. Some perpetrators claimed to be identified with Anonymous, but according to Dr. Tal Pavel of MiddleEasterNet, the claim was not necessarily true.[65]

Syria

On November 30, 2012, the group declared an operation to shut down websites of the Syrian government, in response to an Internet blackout the previous day believed to be imposed by Syrian authorities in an attempt to silence opposition groups of the Syrian civil war.[66]

Impact

Reception

KTTV Fox 11 investigative report on Anonymous.
On July 26, 2007, Fox affiliate KTTV in Los Angeles, California aired a report on Anonymous, calling them a group of "hackers on steroids," "domestic terrorists," and collectively an "Internet hate machine." The report covered an attack on a Myspace user, who claimed to have had his Myspace account "hacked" into seven times by Anonymous, and plastered with images of gay pornography. The Myspace user also claimed a virus written by Anonymous hackers was sent to him and to ninety friends on his Myspace contact list, crashing thirty-two of his friends' computers. The report featured an unnamed former "hacker" who had fallen out with Anonymous and explained his view of the Anonymous culture. In addition, the report also mentioned "raids" on Habbo, a "national campaign to spoil the new Harry Potter book ending", and threats to "bomb sports stadiums."[15][67]
The day following the KTTV report, Wired News blogger and journalist Ryan Singel derided the report, stating that Fox news service had confused the hacker group with "supremely bored 15-year olds who post obscene pictures" from the English-language imageboard website 4chan, and that the news report was "by far the funniest prank anyone on the board has ever pulled off."[68] In February 2008, an Australia-based Today Tonight broadcast included a segment of the KTTV report, preceded by the statement: "The Church of Scientology has ramped up the offensive against Anonymous, accusing the group of religious bigotry and claiming they are sick, twisted souls."[69]
Graham Cluley, a security expert for Sophos, argued that Anonymous' actions against child porn websites hosted on a darknet could be counterproductive, commenting that while their intentions appear beneficial, the removal of illegal websites and sharing networks should be performed by the authorities, rather than Internet vigilantes.[70]
The English language edition of Al Jazeera published regular articles on Anonymous and its activism. The journal also ran opinion pieces on the group, sometimes laudatory, describing it as a future form of internet-based social activism:
"This is the future, whether one approves or not, and the failure on the part of governments and media alike to understand, and contend with the rapid change now afoot, ought to remind everyone concerned why it is that this movement is necessary in the first place."[71]
In January 2008, Search Engine, a Canadian radio show published by CBC Radio One, began reporting on Project Chanology. Host Jesse Brown called Anonymous "clowns," citing their lack of coordination, vulgar humor, and pack mentality, and invited them to confront him in person. On February 7, two members of Anonymous appeared on the show, explaining the nature of the group and the genuine criticism they held for Scientology.[19] After Anonymous held a protest in front of Scientology compounds around the world on February 10, 2008, Brown admitted that they had "proved me wrong."[72]
The nature of the protest was unprecedented—picketers wore masks and refused to divulge names—and sparked a follow-up discussion on the show about journalistic standards for source protection, and the meaning of identity. Brown brought the issue to his own workplace, interviewing CBC's president Hubert Lacroix in reaction to a conflict between him and an anonymous critic who went by the handle "Ouimet."[19]

Reaction from law enforcement agencies

Arrests

First, who is this group called Anonymous? Put simply, it is an international cabal of criminal hackers dating back to 2003, who have shut down the websites of the U.S. Department of Justice and the F.B.I. They have hacked into the phone lines of Scotland Yard. They are responsible for attacks against MasterCard, Visa, Sony and the Governments of the U.S., U.K., Turkey, Australia, Egypt, Algeria, Libya, Iran, Chile, Colombia and New Zealand.
—Canadian MP Marc Garneau, 2012[73]
In December 2010, the Dutch police arrested a 16-year old for cyberattacks against Visa, MasterCard and PayPal in conjunction with Anonymous' DDoS attacks against companies opposing Wikileaks.[74]
In January 2011, the FBI issued more than 40 search warrants in a probe against the Anonymous attacks on companies that opposed Wikileaks. The FBI did not issue any arrest warrants, but issued a statement that participating in DDoS attacks is a criminal offense with a sentence of up to 10 years in prison.[75][76]
In January 2011, the British police arrested five male suspects between the ages of 15 and 26 with suspicion of participating in Anonymous DDoS attacks.[77]
Matthew George, a Newcastle, New South Wales resident, concerned with forthcoming Australian internet filtration legislation, was arrested for his participation in Anonymous DDoS activities. George participated in Anonymous IRC discussions, and allowed his computer to be used in a denial of service attack associated with Operation Titstorm. Tracked down by authorities, he was fined $550, though he was not fully aware that his actions were illegal, and believed his participation in Operation Titstorm had been a legal form of civil protest. His experience left him disillusioned with the potential of online anonymity, warning others: "There is no way to hide on the internet, no matter how hard you cover your tracks you can get caught. You're not invincible."[78]
On June 10, 2011, the Spanish police captured three purported members of Anonymous in the cities of Gijon, Barcelona and Valencia. The operation deactivated the main server from which the three men coordinated DDoS attacks. This particular group had made attacks on the web servers of the PlayStation Store, BBVABankia, and the websites of the governments of Egypt, Algeria, Libya, Iran, Chile, Colombia and New Zealand. The operation revealed that their structure consisted of "cells" which at any given time could coordinate attacks through the downloading of software; the decision-making process to attack occurred in chat rooms. The Spanish national police stated that this operation corresponds to the fact that the Spanish government and NATO considers this group of hackers a threat to national security.[79]
On June 13, 2011, officials in Turkey arrested 32 individuals that were allegedly involved in DDoS attacks on Turkish government websites. These members of Anonymous were captured in different cities of Turkey including Istanbul and Ankara. According to PC Magazine these individuals were arrested after they attacked these websites as a response to the Turkish government demand to ISPs to implement a system of filters that many have perceived as censorship.[80][81]
During July 19–20, 2011, as many as 20 or more arrests were made of suspected Anonymous hackers in the US, UK, and Netherlands following the 2010 Operation Avenge Assange in which the group attacked PayPal, as well as attacking MasterCard and Visa after they froze Wikileaks accounts. According to US officials statements suspects' homes were raided and suspects were arrested in Alabama, Arizona, California, Colorado, Washington DC, Florida, Massachusetts, Nevada, New Mexico, and Ohio, as well as a 16 year old boy being held by the police in south London on suspicion of breaching the Computer Misuse Act 1990, and four being held in the Netherlands.[82][83][84][85]
On February 28, 2012, Interpol issued warrants for the arrests of 25 people with suspected links to Anonymous, according to a statement from the international police agency. The suspects, between the ages of 17 and 40, were all arrested.[86]
On September 12, 2012; Anonymous spokesman Barrett Brown was arrested at his home in Dallas on charges of threatening an FBI agent. Agents arrested Brown while he was in the middle of a Tinychat session.[87]

Convictions

AnonOps admin Christopher "Nerdo" Weatherhead, 22, who organised DDoS attacks against PayPal, known as "Operation Payback", was convicted on one count of conspiracy to impair the operation of computers following a guilty verdict by a jury at Southwark Crow in December 2012. He was sent down for 18 months.[88] Rhodes, of Camberwell, south London, got seven months, for conspiring to impair the operation of computers. Co-defendant Peter Gibson, 24, of Hartlepool, was deemed to have played a lesser role in the conspiracy, which he also admitted, and given a six-month suspended sentence.

Fear of retaliation

On January 28, 2012, the Wall Street Journal stated that US law enforcement officers are concerned about cyber-retaliation attacks by the group. The US has been investigating WikiLeaks founder Julian Assange, although no charges have been filed and his legal team say the US has no jurisdiction, as the Australian citizen has committed no crimes on U.S. soil. The concern was caused by suspicion that Anonymous was involved in retaliatory attacks. A prosecutor in the investigation faced so many personal intrusions that colleagues became concerned about the possibility of bodily harm, according to journalist Devlin Barrett, who explained the Department of Justice was acting unusually by suppressing the names of officials in public statements to the press, but not in court documents. Barrett said there was debate within the Department of Justice and the FBI over the release of names of officials working on the Megaupload c

 
Free Web Hosting | Top Hosting | Great HTML Templates from easytemplates.com.